Search Results for - Narrowed by: S&eacute;curit&eacute; informatique. - Computer software -- Development. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$002509S$0025C3$0025A9curit$0025C3$0025A9$002binformatique.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsoftware$002b--$002bDevelopment.$002509Computer$002bsoftware$002b--$002bDevelopment.$0026ps$003d300? 2024-05-31T04:24:15Z Intro to secure application deployment with Istio on Kubernetes. ent://SD_ILS/0/SD_ILS:2332181 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Poddar, Neeraj, presenter.<br/><a href="https://learning.oreilly.com/videos/~/10000MNHV202219">https://learning.oreilly.com/videos/~/10000MNHV202219</a> <a href="https://learning.oreilly.com/videos/~/10000MNHV202219/?ar">https://learning.oreilly.com/videos/~/10000MNHV202219/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar">https://go.oreilly.com/library-access/library/view/-/10000MNHV202219/?ar</a><br/>Format:&#160;Video recording<br/> Securing DevOps ent://SD_ILS/0/SD_ILS:2319465 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Vehent, Julien, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar">https://go.oreilly.com/library-access/library/view/-/9781617294136/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781617294136">https://learning.oreilly.com/library/view/~/9781617294136</a> <a href="https://learning.oreilly.com/library/view/~/9781617294136/?ar">https://learning.oreilly.com/library/view/~/9781617294136/?ar</a><br/>Format:&#160;Electronic Resources<br/> Official (ISC)2 guide to the CSSLP CBK ent://SD_ILS/0/SD_ILS:2300303 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781466571273">https://learning.oreilly.com/library/view/~/9781466571273</a> <a href="https://learning.oreilly.com/library/view/~/9781466571273/?ar">https://learning.oreilly.com/library/view/~/9781466571273/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar">https://go.oreilly.com/library-access/library/view/-/9781466571273/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:2302626 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format:&#160;Electronic Resources<br/> Basiswissen Sichere Software : aus- und Weiterbildung zum ISSECO Certified Professionell for Secure Software Engineering ent://SD_ILS/0/SD_ILS:2310500 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Paulus, Sachar, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781457170379/?ar">https://go.oreilly.com/library-access/library/view/-/9781457170379/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457170379/?ar">https://learning.oreilly.com/library/view/~/9781457170379/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781457170379">https://learning.oreilly.com/library/view/~/9781457170379</a><br/>Format:&#160;Electronic Resources<br/> Secure and Resilient Software ent://SD_ILS/0/SD_ILS:2323699 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Merkow, Mark, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439866221/?ar">https://learning.oreilly.com/library/view/~/9781439866221/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar">https://go.oreilly.com/library-access/library/view/-/9781439866221/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439866221">https://learning.oreilly.com/library/view/~/9781439866221</a><br/>Format:&#160;Electronic Resources<br/> Official (ISC)2 guide to the CSSLP ent://SD_ILS/0/SD_ILS:2292921 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Paul, Mano.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826058/?ar">https://learning.oreilly.com/library/view/~/9781439826058/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439826058/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826058/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure and resilient software development ent://SD_ILS/0/SD_ILS:2289816 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Merkow, Mark S.<br/><a href="https://learning.oreilly.com/library/view/~/9781439826973/?ar">https://learning.oreilly.com/library/view/~/9781439826973/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar">https://go.oreilly.com/library-access/library/view/-/9781439826973/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of software security assessment : identifying and preventing software vulnerabilities ent://SD_ILS/0/SD_ILS:2282886 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Dowd, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321444426/?ar">https://go.oreilly.com/library-access/library/view/-/0321444426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321444426/?ar">https://learning.oreilly.com/library/view/~/0321444426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321444426">https://learning.oreilly.com/library/view/~/0321444426</a><br/>Format:&#160;Electronic Resources<br/> The security development lifecycle : SDL, a process for developing demonstrably more secure software ent://SD_ILS/0/SD_ILS:2282462 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Howard, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/0735622140">https://learning.oreilly.com/library/view/~/0735622140</a> <a href="https://learning.oreilly.com/library/view/~/0735622140/?ar">https://learning.oreilly.com/library/view/~/0735622140/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0735622140/?ar">https://go.oreilly.com/library-access/library/view/-/0735622140/?ar</a><br/>Format:&#160;Electronic Resources<br/> Secure programming cookbook for C and C++ ent://SD_ILS/0/SD_ILS:2286392 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Viega, John.<br/><a href="https://learning.oreilly.com/library/view/~/0596003943">https://learning.oreilly.com/library/view/~/0596003943</a> <a href="https://learning.oreilly.com/library/view/~/0596003943/?ar">https://learning.oreilly.com/library/view/~/0596003943/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0596003943/?ar">https://go.oreilly.com/library-access/library/view/-/0596003943/?ar</a><br/>Format:&#160;Electronic Resources<br/> Building secure software : how to avoid security problems the right way ent://SD_ILS/0/SD_ILS:2288354 2024-05-31T04:24:15Z 2024-05-31T04:24:15Z by&#160;Viega, John.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780672334092/?ar">https://go.oreilly.com/library-access/library/view/-/9780672334092/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780672334092/?ar">https://learning.oreilly.com/library/view/~/9780672334092/?ar</a><br/>Format:&#160;Electronic Resources<br/>